Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (666)
  • Article (152)
  • News (95)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 92 Next »

13%
More Small Tools for HPC Admins
16.11.2017
Home »  HPC  »  Articles  » 
, Figure 1 shows a screen capture from my laptop running this command. Figure 1: Output from the “watch -n 1 uptime” command. One useful option to use
13%
Understanding Autodiscovery
20.12.2012
Home »  Articles  » 
 
the appropriate monitoring system. Subsequently, all it has to do is sound an alarm if an incident occurs. However, things are different in practice. Neither Nagios nor Icinga has an autodiscovery function. However
13%
Command-line tools for the HPC administrator
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Vasyl Nesterov, 123RF.com
The HPC world has some amazing "big" tools that help administrators monitor their systems and keep them running, such as the Ganglia and Nagios cluster monitoring systems. Although
13%
HTTP Sniffer Httpry Can Now Parse IPv6
10.08.2011
Home »  News  » 
 
writes them to a logfile. Httpry can be used for debugging web applications, monitoring network traffing or enforcing browsing policies.
13%
Five Common Security Mistakes to Avoid
22.02.2023
Home »  News  » 
 
IT operations teams play a large role in security, says Christopher Tozzi. "It falls to them to deploy applications, monitor them for risks, and respond to security risks as they arise
13%
How to Check Resource Usage of Your Kubernetes Pod
07.04.2023
Home »  News  » 
 
An essential part of Kubernetes administration involves monitoring resource usage for your nodes, says Korbin Brown. “Checking how much CPU and RAM resources a pod is utilizing can tell you
13%
Automated Azure Kubernetes Service cluster builds
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Kittipong Jirasukhanont, 123RF.com
can authenticate to the cloud platform. (I do this as the chris user, not the root user, to limit the permissions used on my laptop.) Next, agree to the pop-up in your browser that asks if you
13%
Bluetooth Vulnerability Makes Spying Easy
28.08.2019
Home »  News  » 
 
pairing to secure their connection.” The vulnerability exposes billions of smartphones, laptops, and industrial devices. There is nothing users can do to protect themselves at this time. According
13%
Vulnerability assessment best practices for enterprises
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Fancycrave on Unsplash
? Does the organization have appropriate measures to ensure that continuous monitoring of the network is maintained to identify any potential security breaches? Does a current and comprehensive
13%
This Linux hardware company puts the emphasis on freedom and privacy
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Image courtesy Swapnil Bhartiya
PureOS that runs on the Librem laptops and 2-in-1 detachable laptop-and-tablet devices. The company is also working on a Linux based smartphone called Librem 5. The Brief History of Purism As a long

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 92 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice